Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 07:54
Static task
static1
Behavioral task
behavioral1
Sample
draw.dll
Resource
win7-20221111-en
General
-
Target
draw.dll
-
Size
304KB
-
MD5
78e05075e686397097de69fb0402263e
-
SHA1
f3e9e7f321deb1a3408053168a6a67c6cd70e114
-
SHA256
3769a84dbe7ba74ad7b0b355a864483d3562888a67806082ff094a56ce73bf7e
-
SHA512
746a430aaad88fa150e7709ed834834fe5d9483c2d92c4838cd26b6f4dad960480daae7dec2a66fb4023c2cbfc316f820f809a7e51a7425900b33fe425759f2b
-
SSDEEP
6144:qvcrjpzLkdo1R6HNX3/jllAbTlj1/BVICh:oaCduiNnHA/Be
Malware Config
Signatures
-
Valak JavaScript Loader 1 IoCs
Processes:
resource yara_rule C:\Users\Public\iVIwVADQD.eLxan valak_js -
Valak JavaScript loader 1 IoCs
Processes:
resource yara_rule C:\Users\Public\iVIwVADQD.eLxan valak -
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 50 4240 wscript.exe 53 4240 wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1656 wrote to memory of 4504 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 4504 1656 rundll32.exe rundll32.exe PID 1656 wrote to memory of 4504 1656 rundll32.exe rundll32.exe PID 4504 wrote to memory of 4240 4504 rundll32.exe wscript.exe PID 4504 wrote to memory of 4240 4504 rundll32.exe wscript.exe PID 4504 wrote to memory of 4240 4504 rundll32.exe wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\draw.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\draw.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewscript.exe //E:jscript "C:\Users\Public\iVIwVADQD.eLxan3⤵
- Blocklisted process makes network request
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\iVIwVADQD.eLxanFilesize
11KB
MD5bc9ac467126926bfd2782428da6f1a09
SHA1f9d6fbc917446025fb63cc622a117a11544ce34b
SHA2560eab2d2538e95419e764bd23408ad7e0cb830b3df3e3e1a77c71af75e6184dd9
SHA512f82193aa1551794f5fbaeb2f958cf00a2b43ea2f135be338425e677ad99b523bb6f3787348e3e714f23f9c037ad21a4925db9c40b432a5c4da460f46fed8a62c
-
memory/4240-137-0x0000000000000000-mapping.dmp
-
memory/4504-132-0x0000000000000000-mapping.dmp
-
memory/4504-134-0x0000000010000000-0x0000000010151000-memory.dmpFilesize
1.3MB
-
memory/4504-133-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/4504-136-0x0000000010000000-0x0000000010151000-memory.dmpFilesize
1.3MB